Behavioral task
behavioral1
Sample
Executor.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Executor.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Executor.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Executor.exe
Resource
win10v2004-20240802-en
General
-
Target
Executor.zip
-
Size
18KB
-
MD5
7bf969fbab5e640eef3966724203975e
-
SHA1
0ffe09af1635c46cccb6966631be47b37fbbdf6e
-
SHA256
99d2e3c0ec9e8192f966ad052c8ba89826f36eab367027021498ac9dcb315f2e
-
SHA512
c17054677218852998b101db916d5d6d01da554331e746fa7293b5de3c87059137983f57469fd8a7f590e45b39e9b44f8a8b16b3196aded01a82655d46040a1e
-
SSDEEP
384:0+9A2hqpk/YsZ2516OGmxOYi8OJ8x/pVFjNg2Nl8UuMXrjxQfYQdfy8:Z9FezD6tKOYi8OJcxVFjN9NKUrzQR
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1283129065590489211/dEU2uHt9OcimjvWOVka-qrppiq2WKyMjW0QOJzCKDx9yJv76ewzma8jOcUZOGqbMoepy
Signatures
-
Mercurialgrabber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Executor.exe
Files
-
Executor.zip.zip
-
Executor.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ